Working with Clients - Practice Resource Center




  • Lisa Jungman
    Karen Tobin
    Business and Securities Law Forum, June 2016

    The advances in technology create numerous circumstances in which lawyers, through their own blunders, unwittingly reveal client confidences or violate attorney-client privilege.

  • Timothy A. Slating
    Illinois Bar Journal, October 2015

    A look at ways to ensure that your clients are the only ones reading email you send them.

  • Ed Finkel
    Illinois Bar Journal, May 2015

    The pathways for breaching client confidentiality - whether due to simple carelessness or inadequate security - continue to multiply as technology advances.

  • Ed Finkel
    Illinois Bar Journal, January 2015

    You're probably already using the Internet to access remote servers - aka cloud computing - whether you know it or not. And you should be. But make sure you understand the risks.

  • Mark S. Mathewson
    Illinois Bar Journal, November 2013

    What duty do you have to clients if your laptop is stolen?

  • Patricia S. Smart
    Federal Civil Practice, December 2012

    The United States District Courts for the Northern and Southern Districts of Illinois recently revised rules relating to the filing of documents under seal. The District Court for the Northern District also adopted a Model Confidentiality Order earlier this year.

  • Vincent Incopero
    The Bottom Line, September 2012

    As a prudent professional, are you aware of your professional and ethical obligations regarding the way that your practice handles personally identifiable information?

  • Michael D. Wong
    YLDNews, April 2012

    Under the recent change to Rule 1.6 of the Illinois Rules of Professional Conduct, without informed consent an attorney may not disclose ANY information regarding a case or representation, even if that information is of public record. 

  • Adam Nelson
    Benjamin Gerber
    Standing Committee on Legal Technology, June 2007

    It has become increasingly important for practicing attorneys to address information security and privacy requirements in their offices.

  • Bernard Wysocki
    General Practice, Solo & Small Firm, October 2006

    From a practical standpoint, it is important when you see a potential third party involvement, to secure written retainer and defining your representation.

  • Peter Mierzwa
    Standing Committee on Legal Technology, May 2006
    Are you sending documents to opposing counsel or third parties that contain (deleted) privileged client information?
  • The Public Servant, February 2005

    As conversations over mobile communications are often not conducted in private areas, lawyers should refrain from using such forms of communication when discussing confidential client matters, unless they are confident that the general public cannot overhear the conversation

Have a suggestion for a practice resource? Please email Mark Mathewson.

These resources are presented as educational resources for for ISBA members. They should not be relied upon as a substitute for individual legal research, and the ISBA does not warrant the accuracy of the information that appears in them.